Digital gold: why hackers love Bitcoin | Technology | The Guardian

The WannaCry ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use money

Fuente: Digital gold: why hackers love Bitcoin | Technology | The Guardian


NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet

The supercomputer described in the trove, “WindsorGreen,” was a system designed to excel at the sort of complex mathematics that underlies encryption, the technology that keeps data private, and almost certainly intended for use by the Defense Department’s signals intelligence wing, the National Security Agency. WindsorGreen was the successor to another password-cracking machine used by the NSA, “WindsorBlue,” which was also documented in the material leaked from NYU and which had been previously described in the Norwegian press thanks to a document provided by National Security Agency whistleblower Edward Snowden. Both systems were intended for use by the Pentagon and a select few other Western governments, including Canada and Norway.

Fuente: NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet


Leaked NSA Malware Is Helping Hijack Computers Around the World

In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.

Fuente: Leaked NSA Malware Is Helping Hijack Computers Around the World


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador

Expertos en informática advierten que un nuevo ataque global con un brote de ransomware es “inminente” y que incluso podría ser lanzado el lunes. BBC Mundo te cuenta los detalles y cómo protegerte de estos virus.

Fuente: WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador


El ciberataque de escala mundial y “dimensión nunca antes vista” que afectó a instituciones y empresas de casi 100 países – El Mostrador

Un ciberataque “de dimensión nunca antes vista” logró este viernes bloquear el acceso a los sistemas informáticos de instituciones estatales y empresas de varios países.La policía europea, Europol, indicó que el ciberataque era de una escala “sin precedentes” y advirtió que una “compleja investigación internacional” era necesaria para “identificar a los culpables”.

Fuente: El ciberataque de escala mundial y “dimensión nunca antes vista” que afectó a instituciones y empresas de casi 100 países – El Mostrador


Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal

it’s possible to make sure that your private conversations are actually private. It starts with installing an app known as Signal, and getting your friends to install it too. Then you’ll want to tweak the settings to lock everything down.

Fuente: Cybersecurity for the People: How to Keep Your Chats Truly Private With Signal


The Strangers Who Got Snowden’s Secrets in the Mail

The story of Edward Snowden’s disclosure of NSA secrets to the press has been told and retold in books, films, and countless articles. Left unreported has been the quiet role of two journalists who literally had Snowden material mailed to them in a cardboard box.

Fuente: The Strangers Who Got Snowden’s Secrets in the Mail


Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador

Tras el ataque al Parlamento Británico ocurrido la semana pasada, los políticos británicos han exigido que Whatsapp y otras aplicaciones de mensajería instantánea proporcionen acceso a la policía y fuerzas de seguridad para así poder monitorear conversaciones terroristas. Sin embargo, los expertos en tecnología discuten que abrir las “puertas traseras” de los servicios de mensajería popular, las cuales usan cifrado de extremo a extremo, arrojaría una serie de problemas.

Fuente: Gobiernos en guerra contra WhatsApp por su cifrado de extremo a extremo – El Mostrador


¿Qué tenía el trabajo universitario que provocó una alerta de seguridad porque equivalía a “exportar armas nucleares a un gobierno hostil”? – El Mostrador

¿Por qué una agencia de espías de Estados Unidos no quería que los universitarios discutieran su trabajo en público? El caso es que no lograron acallarlos y, gracias a ello, tenemos la web.

Fuente: ¿Qué tenía el trabajo universitario que provocó una alerta de seguridad porque equivalía a “exportar armas nucleares a un gobierno hostil”? – El Mostrador


New York’s New Digital Crime Lab Is a Forensic Marvel

In an exclusive tour of the new lab, Fortune got a glimpse of Law & Order in the digital age. The lab is Exhibit A in how America’s biggest city is embracing big data analytics and a dash of hacker culture to solve complex crimes. It also raises hard questions about how to balance these sophisticated crime-fighting tools with civil liberties.

Fuente: New York’s New Digital Crime Lab Is a Forensic Marvel


Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser

Hillary Clinton’s advisers recognized that her policy position on encryption was problematic, with one writing that it was tantamount to insisting that there was “‘some way’ to do the impossible.”Instead, according to campaign emails released by Wikileaks, they suggested that the campaign signal its willingness to use “malware” or “super code breaking by the NSA” to get around encryption.

Fuente: Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser


Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian

Finally, Yahoo’s possible betrayal of its users is another example of why whistleblowers and leaks to the press are so important. The US government considers this type of surveillance “legal” even though it shocks the conscience of many ordinary Americans and dozens of civil liberties groups have been attempting to have courts rule it illegal for years.

Fuente: Yahoo may have let the government spy on emails. Now will we embrace encryption? | Trevor Timm | Opinion | The Guardian


Google Chrome Will Start Shaming Unencrypted Websites in January | Motherboard

Starting in January of 2017, Google’s Chrome browser will start flagging some websites that don’t use web encryption as “Not Secure”—the first step in Google’s eventual plan to shame all sites that don’t use encryption.

Fuente: Google Chrome Will Start Shaming Unencrypted Websites in January | Motherboard


Visa eyes new link in blockchain payments – FT.com

Visa will take its first step towards disrupting the market for payments between banks on Thursday by inviting lenders to test a system for sending money over blockchain, the technology underpinning bitcoin.

Fuente: Visa eyes new link in blockchain payments – FT.com


Big banks plan to coin new digital currency – FT.com

Four of the world’s biggest banks have teamed up to develop a new form of digital cash that they believe will become an industry standard to clear and settle financial trades over blockchain, the technology underpinning bitcoin.

Fuente: Big banks plan to coin new digital currency – FT.com


El pionero satélite cuántico chino que puede revolucionar las comunicaciones del mundo – El Mostrador

Se trata de un millonario y ambicioso proyecto apodado QUESS, que pone al gigante asiático a la cabeza de una revolución tecnológica: crear nuevas redes de comunicación globales a prueba de hackeos.

Fuente: El pionero satélite cuántico chino que puede revolucionar las comunicaciones del mundo – El Mostrador


All Bitfinex clients to share 36% loss of assets following exchange hack | Technology | The Guardian

Bitfinex, the cryptocurrency exchange that lost $72m (£55m) to hackers last week, has told customers they will lose just over 36% of the assets they had on the platform but will be compensated for these losses with tokens of credit.

Fuente: All Bitfinex clients to share 36% loss of assets following exchange hack | Technology | The Guardian


Security Tips Every Signal User Should Know

Although Signal is well-designed, there are extra steps you must take if you want to maximize the security for your most sensitive conversations — the ones that could be misinterpreted by an employer, client, or airport security screener; might be of interest to a snooping government, whether at home or abroad; or could allow a thief or hacker to blackmail you or steal your identity.

Fuente: Security Tips Every Signal User Should Know


FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’

The FBI has “hundreds of millions of dollars” to spend on developing technology for use in both national security and domestic law enforcement investigations — but it won’t reveal the exact amount.

Fuente: FBI’s Secret Surveillance Tech Budget Is ‘Hundreds of Millions’


Take that, FBI: Apple goes all in on encryption | Technology | The Guardian

The new feature is just the latest move towards more widespread encryption in consumer technology products following Apple’s standoff with the FBI earlier in 2016, in which it refused to help the agency weaken its own security processes to access information on an iPhone belonging to a terrorist. Facebook and Google both pledged support for Apple during the fight, and both are subsequently reported to be planning encrypted versions of their messaging apps.

Fuente: Take that, FBI: Apple goes all in on encryption | Technology | The Guardian


El celular de 16 mil dólares que ofrece seguridad militar a los famosos – El Mostrador

El nuevo celular de la startup londinense Sirin Labs se jacta de ser el mejor en lo que a seguridad se refiere: tiene un sistema de cifrado “nivel militar”.

Fuente: El celular de 16 mil dólares que ofrece seguridad militar a los famosos – El Mostrador


Tor Project is working on a web-wide random number generator / Boing Boing

Random number generators are the foundation of cryptography — that’s why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed.The Tor Project faces serious, state-level adversaries, including the FBI, and so it needs all the randomness it can get — randomness that can’t be made predictable even if you’ve compromised the user’s computer, even.

Fuente: Tor Project is working on a web-wide random number generator / Boing Boing


Court refuses request to force alleged hacker to divulge passwords | Technology | The Guardian

An alleged hacker fighting extradition to the US will not have to give the passwords for his encrypted computers to British law enforcement officers, following a landmark legal ruling.

Fuente: Court refuses request to force alleged hacker to divulge passwords | Technology | The Guardian


Child porn suspect jailed indefinitely for refusing to decrypt hard drives | Ars Technica

A Philadelphia man suspected of possessing child pornography has been in jail for seven months and counting after being found in contempt of a court order demanding that he decrypt two password-protected hard drives.

Fuente: Child porn suspect jailed indefinitely for refusing to decrypt hard drives | Ars Technica


La Justicia brasileña ordena de nuevo el bloqueo de WhatsApp durante 72 horas

El motivo es el incumplimiento por parte de WhatsApp de órdenes judiciales que obligan a la empresa a romper el sigilo de mensajes enviados por supuestos narcotraficantes a través de la aplicación, propiedad de Facebook

Fuente: La Justicia brasileña ordena de nuevo el bloqueo de WhatsApp durante 72 horas


Craig Wright U-turns on pledge to provide evidence he invented bitcoin | Technology | The Guardian

Alex Hern@alexhernThursday 5 May 2016 13.55 BSTLast modified on Thursday 5 May 2016 15.47 BSTSave for laterCraig Wright, the Australian computer scientist who claimed to be Satoshi Nakamoto, the creator of bitcoin, has backtracked on a pledge to provide proof of his earlier claims.Despite promising on Tuesday that he would be offering “extraordinary evidence” to verify his claim that he is really Satoshi Nakamoto, Wright wiped his blog on Thursday, replacing it only with a message headlined: “I’m Sorry.”

Fuente: Craig Wright U-turns on pledge to provide evidence he invented bitcoin | Technology | The Guardian


‘Crypto Wars’ timeline: A history of the new encryption debate

Encryption is finally mainstream.Government officials and technologists have been debating since the early 1990s whether to limit the strength of encryption to help the law-enforcement and intelligence communities monitor suspects’ communications. But until early 2016, this was a mostly esoteric fight, relegated to academic conferences, security agencies’ C-suites, and the back rooms of Capitol Hill.Everything changed in mid-February, when President Barack Obama’s Justice Department, investigating the terrorists who carried out the San Bernardino, California, shooting, asked a federal judge to force Apple to help the Federal Bureau of Investigation unlock one attacker’s iPhone.What followed was an unexpectedly rancorous and unprecedentedly public fight over how far the government should go to pierce and degrade commercial security technology in its quest to protect Americans from terrorism.

Fuente: ‘Crypto Wars’ timeline: A history of the new encryption debate


Australian Craig Wright claims he is bitcoin founder Satoshi Nakamoto | Technology | The Guardian

Australian entrepreneur Craig Wright has identified himself as Satoshi Nakamato, the pseudonymous creator of the digital currency bitcoin.Wright, who was named as the cryptocurrency’s founder by two separate media investigations in December, made the admission in a blog post on Monday, providing what he says is technical proof of his claim.

Fuente: Australian Craig Wright claims he is bitcoin founder Satoshi Nakamoto | Technology | The Guardian


Snowden Debates CNN’s Fareed Zakaria on Encryption

NSA whistleblower and privacy advocate Edward Snowden took part in his first public debate on encryption on Tuesday night, facing off against CNN’s Fareed Zakaria, a journalist and author known for his coverage of international affairs.

Fuente: Snowden Debates CNN’s Fareed Zakaria on Encryption


With Facebook No Longer a Secret Weapon, Egypt’s Protesters Turn to Signal

Although the police in Cairo sealed off parts of the Egyptian capital where protests scheduled on Facebook were to have taken place on Monday, opposition activists managed to stage brief rallies that resembled flash mobs, calling for an end to military rule and the cancellation of a deal to surrender two islands to Saudi Arabia.The fact that Facebook is now so closely monitored by the security forces prompted one leading activist to offer an online tutorial in how to use a new tool, the encrypted messaging app Signal, to help protesters find each other on the city’s streets, and stay one step ahead of the authorities.

Fuente: With Facebook No Longer a Secret Weapon, Egypt’s Protesters Turn to Signal


Europe’s leap into the quantum computing arms race — FT.com

It is a dizzying gamble and there are billions of euros riding on the outcome. If the wager pays off, Europe will hold its own against mighty China and the US; if not, the entire project will be regarded in hindsight as a breathtakingly indulgent folly. I refer, of course, not to the forthcoming referendum on Britain’s EU membership but to the European Commission’s announcement last week that it would be launching a €1bn plan to explore “quantum technologies”. It is the third of the commission’s Future and Emerging Technologies Flagship projects — visionary megaprojects lasting a decade or more. These are challenges too grand — and bets too risky — for a single nation to square up to on its own.

Fuente: Europe’s leap into the quantum computing arms race — FT.com


¿Hasta qué punto son seguras las telecomunicaciones cifradas? – El Mostrador

Con la mirada puesta en la anhelada meta de la privacidad, la universalización del cifrado para la seguridad de las telecomunicaciones en internet se perfila ya como un camino sin retorno, avalado por los últimos movimientos de populares plataformas en el sector, aunque teñido de sombras.

Fuente: ¿Hasta qué punto son seguras las telecomunicaciones cifradas? – El Mostrador


Ron Wyden vows to filibuster anti-cryptography bill / Boing Boing

Senators Richard Burr [R-NC] and Dianne Feinstein [D-CA] finally introduced their long-rumored anti-crypto bill, which will ban US companies from making products with working cryptography, mandating that US-made products have some way to decrypt information without the user’s permission.

Fuente: Ron Wyden vows to filibuster anti-cryptography bill / Boing Boing


¿Cómo se verifica que yo soy yo en Internet? Una mirada a los proyectos de identificación electrónica en la región « Digital Rights

A medida que aumenta la penetración de Internet y se incrementan los trámites que el gobierno nos ofrece por este medio, aumenta el problema para definir cuáles son los procesos válidos para la autenticación electrónica de usuarios, su identificación y las firmas electrónicas de documentos que se requieren en los diferentes trámites. Sobre todo porque en el mundo crece la suplantación y el robo de identidad asociados a fraudes.

Fuente: ¿Cómo se verifica que yo soy yo en Internet? Una mirada a los proyectos de identificación electrónica en la región « Digital Rights


Microsoft y Apple redoblan lucha por privacidad de datos en EEUU – El Mostrador

Si bien estos casos judiciales destacados han sumado impulso, la ofensiva del sector contra la intrusión gubernamental en la información privada de los clientes comenzó hace al menos dos años, luego de las revelaciones de Edward Snowden sobre la recolección encubierta de datos que pusieron a todos a la defensiva.

Fuente: Microsoft y Apple redoblan lucha por privacidad de datos en EEUU – El Mostrador


La clave de cifrado global de BlackBerry, en manos de la polícia

Problemas para BlackBerry. Mientras Apple lucha en los tribunales -y fuera de ellos- para proteger la privacidad de los usuarios, Vice News desvela, a través de documentos por un caso de asesinato, cómo la Policía Canadiense habría obtenido la clave de cifrado global de BlackBerry, haciendo de la seguridad del sistema… algo prácticamente inservible y al servicio de las fuerzas y cuerpos de seguridad de Canadá. ¿Y lo peor del asunto? según fuentes de Vice, poseen esta clave desde 2010.

Fuente: La clave de cifrado global de BlackBerry, en manos de la polícia


Drive towards strong encryption will end

What happens when the wave of encryption rippling through the personal technology world washes up against the realities of the data economy?Most of the recent debate over the spread of encryption has centred on the implications for personal privacy and national security. Less has been said about business: in particular, what a greater use of encryption will mean for the usability of tech products and services, and for the business models that rely on capturing and extracting value from data.

Fuente: Drive towards strong encryption will end


White House declines to support encryption legislation | Technology | The Guardian

Obama administration allegedly would not support bills that would give judges clearer authority to order tech companies to help law enforcement crack data

Fuente: White House declines to support encryption legislation | Technology | The Guardian


Forget Apple's fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian

The privacy crisis is a disaster of our own making – and now the tech firms who gathered our data are trying to make money out of privacy

Fuente: Forget Apple’s fight with the FBI – our privacy catastrophe has only just begun | Technology | The Guardian


Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”

Obama’s first extended disquisition on the contentious issue of encryption suggests he’s only been listening to one side.

Fuente: Obama Wants Nonexistent Middle Ground on Encryption, Warns Against “Fetishizing Our Phones”


Snowden: FBI's claim it can't unlock the San Bernardino iPhone is 'bullshit' | Technology | The Guardian

NSA whistleblower rubbishes claims that only Apple can unlock killer’s iPhone 5C, indicating FBI has the means itself

Fuente: Snowden: FBI’s claim it can’t unlock the San Bernardino iPhone is ‘bullshit’ | Technology | The Guardian


Apple Macs targeted by KeRanger ransomware for first time | Technology | The Guardian

Apple customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks have revealed.Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data.

Fuente: Apple Macs targeted by KeRanger ransomware for first time | Technology | The Guardian


NSA Is Mysteriously Absent From FBI-Apple Fight

The Federal Bureau of Investigation insisted that it was helpless. The bureau told a judge in February that Apple has the “exclusive technical means” to try to unlock the contents of San Bernardino shooter Syed Rizwan Farook’s iPhone — and that’s why it should be forced to do so. But notably missing from the FBI’s argument was any mention of whether it had consulted spies and sleuths from the government’s intelligence community — particularly the National Security Agency. The Twitterverse exploded with q

Fuente: NSA Is Mysteriously Absent From FBI-Apple Fight